rust-analyzer/crates/project-model/src/sysroot.rs

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

318 lines
10 KiB
Rust
Raw Normal View History

//! Loads "sysroot" crate.
//!
//! One confusing point here is that normally sysroot is a bunch of `.rlib`s,
//! but we can't process `.rlib` and need source code instead. The source code
//! is typically installed with `rustup component add rust-src` command.
2021-10-21 15:49:28 +00:00
use std::{env, fs, iter, ops, path::PathBuf, process::Command};
2019-01-10 19:21:14 +00:00
use anyhow::{format_err, Result};
use base_db::CrateName;
2021-01-14 15:47:42 +00:00
use la_arena::{Arena, Idx};
use paths::{AbsPath, AbsPathBuf};
2022-09-19 15:31:08 +00:00
use rustc_hash::FxHashMap;
2020-05-08 12:54:29 +00:00
2023-04-20 19:25:39 +00:00
use crate::{utf8_stdout, CargoConfig, CargoWorkspace, ManifestPath};
2019-01-10 19:21:14 +00:00
#[derive(Debug, Clone, Eq, PartialEq)]
2019-01-10 19:21:14 +00:00
pub struct Sysroot {
root: AbsPathBuf,
src_root: AbsPathBuf,
2020-03-19 15:00:11 +00:00
crates: Arena<SysrootCrateData>,
2023-04-20 19:25:39 +00:00
/// Stores the result of `cargo metadata` of the `RA_UNSTABLE_SYSROOT_HACK` workspace.
pub hack_cargo_workspace: Option<CargoWorkspace>,
2019-01-10 19:47:05 +00:00
}
2020-11-02 15:31:38 +00:00
pub(crate) type SysrootCrate = Idx<SysrootCrateData>;
2019-01-10 19:47:05 +00:00
#[derive(Debug, Clone, Eq, PartialEq)]
2020-03-19 16:59:31 +00:00
pub struct SysrootCrateData {
pub name: String,
pub root: ManifestPath,
2020-03-19 16:59:31 +00:00
pub deps: Vec<SysrootCrate>,
}
impl ops::Index<SysrootCrate> for Sysroot {
type Output = SysrootCrateData;
fn index(&self, index: SysrootCrate) -> &SysrootCrateData {
&self.crates[index]
}
2019-01-10 19:21:14 +00:00
}
impl Sysroot {
2022-07-25 14:59:10 +00:00
/// Returns sysroot "root" directory, where `bin/`, `etc/`, `lib/`, `libexec/`
/// subfolder live, like:
/// `$HOME/.rustup/toolchains/nightly-2022-07-23-x86_64-unknown-linux-gnu`
pub fn root(&self) -> &AbsPath {
&self.root
}
2022-07-25 14:59:10 +00:00
/// Returns the sysroot "source" directory, where stdlib sources are located, like:
/// `$HOME/.rustup/toolchains/nightly-2022-07-23-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library`
pub fn src_root(&self) -> &AbsPath {
&self.src_root
}
pub fn public_deps(&self) -> impl Iterator<Item = (CrateName, SysrootCrate, bool)> + '_ {
// core is added as a dependency before std in order to
// mimic rustcs dependency order
2021-09-28 19:39:41 +00:00
["core", "alloc", "std"]
2021-11-03 12:21:46 +00:00
.into_iter()
2021-09-28 19:39:41 +00:00
.zip(iter::repeat(true))
.chain(iter::once(("test", false)))
.filter_map(move |(name, prelude)| {
Some((CrateName::new(name).unwrap(), self.by_name(name)?, prelude))
})
2019-01-10 20:05:22 +00:00
}
2019-11-24 10:33:12 +00:00
pub fn proc_macro(&self) -> Option<SysrootCrate> {
self.by_name("proc_macro")
}
2022-10-19 20:25:57 +00:00
pub fn crates(&self) -> impl Iterator<Item = SysrootCrate> + ExactSizeIterator + '_ {
2019-01-10 21:37:10 +00:00
self.crates.iter().map(|(id, _data)| id)
}
pub fn is_empty(&self) -> bool {
self.crates.is_empty()
}
pub fn loading_warning(&self) -> Option<String> {
if self.by_name("core").is_none() {
let var_note = if env::var_os("RUST_SRC_PATH").is_some() {
" (`RUST_SRC_PATH` might be incorrect, try unsetting it)"
} else {
" try running `rustup component add rust-src` to possible fix this"
};
Some(format!(
"could not find libcore in loaded sysroot at `{}`{var_note}",
self.src_root.as_path(),
))
} else {
None
}
}
2022-10-01 18:47:31 +00:00
}
2019-01-10 21:37:10 +00:00
// FIXME: Expose a builder api as loading the sysroot got way too modular and complicated.
2022-10-01 18:47:31 +00:00
impl Sysroot {
2022-10-19 20:25:57 +00:00
/// Attempts to discover the toolchain's sysroot from the given `dir`.
2022-09-19 15:31:08 +00:00
pub fn discover(dir: &AbsPath, extra_env: &FxHashMap<String, String>) -> Result<Sysroot> {
tracing::debug!("discovering sysroot for {dir}");
2022-09-19 15:31:08 +00:00
let sysroot_dir = discover_sysroot_dir(dir, extra_env)?;
2022-10-01 18:47:31 +00:00
let sysroot_src_dir =
discover_sysroot_src_dir_or_add_component(&sysroot_dir, dir, extra_env)?;
Ok(Sysroot::load(sysroot_dir, sysroot_src_dir))
}
pub fn discover_with_src_override(
current_dir: &AbsPath,
extra_env: &FxHashMap<String, String>,
src: AbsPathBuf,
) -> Result<Sysroot> {
tracing::debug!("discovering sysroot for {current_dir}");
let sysroot_dir = discover_sysroot_dir(current_dir, extra_env)?;
Ok(Sysroot::load(sysroot_dir, src))
}
pub fn discover_rustc_src(&self) -> Option<ManifestPath> {
get_rustc_src(&self.root)
}
pub fn discover_rustc(&self) -> Result<AbsPathBuf, std::io::Error> {
let rustc = self.root.join("bin/rustc");
tracing::debug!(?rustc, "checking for rustc binary at location");
match fs::metadata(&rustc) {
Ok(_) => Ok(rustc),
Err(e) => Err(e),
}
}
2022-10-01 18:47:31 +00:00
pub fn with_sysroot_dir(sysroot_dir: AbsPathBuf) -> Result<Sysroot> {
let sysroot_src_dir = discover_sysroot_src_dir(&sysroot_dir).ok_or_else(|| {
format_err!("can't load standard library from sysroot path {sysroot_dir}")
2022-10-01 18:47:31 +00:00
})?;
Ok(Sysroot::load(sysroot_dir, sysroot_src_dir))
2022-10-01 18:47:31 +00:00
}
2023-04-20 19:25:39 +00:00
pub fn load(sysroot_dir: AbsPathBuf, mut sysroot_src_dir: AbsPathBuf) -> Sysroot {
// FIXME: Remove this `hack_cargo_workspace` field completely once we support sysroot dependencies
let hack_cargo_workspace = if let Ok(path) = std::env::var("RA_UNSTABLE_SYSROOT_HACK") {
let cargo_toml = ManifestPath::try_from(
AbsPathBuf::try_from(&*format!("{path}/Cargo.toml")).unwrap(),
)
.unwrap();
sysroot_src_dir = AbsPathBuf::try_from(&*path).unwrap().join("library");
CargoWorkspace::fetch_metadata(
&cargo_toml,
&AbsPathBuf::try_from("/").unwrap(),
&CargoConfig::default(),
&|_| (),
)
.map(CargoWorkspace::new)
.ok()
} else {
None
};
let mut sysroot = Sysroot {
root: sysroot_dir,
src_root: sysroot_src_dir,
crates: Arena::default(),
hack_cargo_workspace,
};
2021-06-21 13:26:26 +00:00
for path in SYSROOT_CRATES.trim().lines() {
let name = path.split('/').last().unwrap();
let root = [format!("{path}/src/lib.rs"), format!("lib{path}/lib.rs")]
2021-11-03 12:21:46 +00:00
.into_iter()
.map(|it| sysroot.src_root.join(it))
.filter_map(|it| ManifestPath::try_from(it).ok())
2021-07-17 13:43:33 +00:00
.find(|it| fs::metadata(it).is_ok());
if let Some(root) = root {
2019-01-10 19:47:05 +00:00
sysroot.crates.alloc(SysrootCrateData {
name: name.into(),
2019-01-10 21:37:10 +00:00
root,
2019-01-10 19:47:05 +00:00
deps: Vec::new(),
});
}
}
if let Some(std) = sysroot.by_name("std") {
2019-01-10 19:47:05 +00:00
for dep in STD_DEPS.trim().lines() {
if let Some(dep) = sysroot.by_name(dep) {
sysroot.crates[std].deps.push(dep)
}
}
}
if let Some(alloc) = sysroot.by_name("alloc") {
2022-11-07 10:45:52 +00:00
for dep in ALLOC_DEPS.trim().lines() {
if let Some(dep) = sysroot.by_name(dep) {
sysroot.crates[alloc].deps.push(dep)
}
2019-06-13 19:59:50 +00:00
}
}
if let Some(proc_macro) = sysroot.by_name("proc_macro") {
2022-11-07 10:45:52 +00:00
for dep in PROC_MACRO_DEPS.trim().lines() {
if let Some(dep) = sysroot.by_name(dep) {
sysroot.crates[proc_macro].deps.push(dep)
}
}
}
sysroot
2019-01-10 19:47:05 +00:00
}
2019-01-10 19:21:14 +00:00
2019-01-10 19:47:05 +00:00
fn by_name(&self, name: &str) -> Option<SysrootCrate> {
let (id, _data) = self.crates.iter().find(|(_id, data)| data.name == name)?;
Some(id)
2019-01-10 19:21:14 +00:00
}
}
2019-01-10 19:47:05 +00:00
2022-09-19 15:31:08 +00:00
fn discover_sysroot_dir(
current_dir: &AbsPath,
extra_env: &FxHashMap<String, String>,
) -> Result<AbsPathBuf> {
let mut rustc = Command::new(toolchain::rustc());
2022-09-19 15:31:08 +00:00
rustc.envs(extra_env);
2022-12-30 08:05:03 +00:00
rustc.current_dir(current_dir).args(["--print", "sysroot"]);
2021-08-15 12:46:13 +00:00
tracing::debug!("Discovering sysroot by {:?}", rustc);
let stdout = utf8_stdout(rustc)?;
Ok(AbsPathBuf::assert(PathBuf::from(stdout)))
}
2022-10-01 18:47:31 +00:00
fn discover_sysroot_src_dir(sysroot_path: &AbsPathBuf) -> Option<AbsPathBuf> {
2020-02-17 22:38:01 +00:00
if let Ok(path) = env::var("RUST_SRC_PATH") {
2022-10-01 18:47:31 +00:00
if let Ok(path) = AbsPathBuf::try_from(path.as_str()) {
let core = path.join("core");
if fs::metadata(&core).is_ok() {
tracing::debug!("Discovered sysroot by RUST_SRC_PATH: {path}");
2022-10-01 18:47:31 +00:00
return Some(path);
}
tracing::debug!("RUST_SRC_PATH is set, but is invalid (no core: {core:?}), ignoring");
2022-10-01 18:47:31 +00:00
} else {
tracing::debug!("RUST_SRC_PATH is set, but is invalid, ignoring");
}
2020-02-17 22:38:01 +00:00
}
2021-06-13 03:54:16 +00:00
get_rust_src(sysroot_path)
2022-10-01 18:47:31 +00:00
}
2022-10-19 19:17:11 +00:00
2022-10-01 18:47:31 +00:00
fn discover_sysroot_src_dir_or_add_component(
sysroot_path: &AbsPathBuf,
current_dir: &AbsPath,
extra_env: &FxHashMap<String, String>,
) -> Result<AbsPathBuf> {
discover_sysroot_src_dir(sysroot_path)
.or_else(|| {
let mut rustup = Command::new(toolchain::rustup());
2022-09-19 15:31:08 +00:00
rustup.envs(extra_env);
2022-12-30 08:05:03 +00:00
rustup.current_dir(current_dir).args(["component", "add", "rust-src"]);
2022-10-19 20:25:57 +00:00
tracing::info!("adding rust-src component by {:?}", rustup);
utf8_stdout(rustup).ok()?;
2021-06-13 03:54:16 +00:00
get_rust_src(sysroot_path)
})
.ok_or_else(|| {
format_err!(
"\
can't load standard library from sysroot
{sysroot_path}
(discovered via `rustc --print sysroot`)
try installing the Rust source the same way you installed rustc",
)
})
}
fn get_rustc_src(sysroot_path: &AbsPath) -> Option<ManifestPath> {
let rustc_src = sysroot_path.join("lib/rustlib/rustc-src/rust/compiler/rustc/Cargo.toml");
let rustc_src = ManifestPath::try_from(rustc_src).ok()?;
tracing::debug!("checking for rustc source code: {rustc_src}");
2021-07-17 13:43:33 +00:00
if fs::metadata(&rustc_src).is_ok() {
Some(rustc_src)
} else {
None
}
}
fn get_rust_src(sysroot_path: &AbsPath) -> Option<AbsPathBuf> {
2021-10-04 15:36:56 +00:00
let rust_src = sysroot_path.join("lib/rustlib/src/rust/library");
tracing::debug!("checking sysroot library: {rust_src}");
2021-10-04 15:36:56 +00:00
if fs::metadata(&rust_src).is_ok() {
Some(rust_src)
} else {
None
}
2020-02-17 21:33:48 +00:00
}
2019-01-10 19:47:05 +00:00
const SYSROOT_CRATES: &str = "
alloc
2022-11-07 10:45:52 +00:00
backtrace
2020-07-30 14:17:59 +00:00
core
2019-01-10 19:47:05 +00:00
panic_abort
2020-07-30 14:17:59 +00:00
panic_unwind
proc_macro
profiler_builtins
std
2021-06-21 13:26:26 +00:00
stdarch/crates/std_detect
2020-07-30 14:17:59 +00:00
test
unwind";
2019-01-10 19:47:05 +00:00
2022-11-07 10:45:52 +00:00
const ALLOC_DEPS: &str = "core";
2019-01-10 19:47:05 +00:00
const STD_DEPS: &str = "
2019-02-03 22:23:59 +00:00
alloc
2020-07-30 14:17:59 +00:00
panic_unwind
2022-11-07 10:45:52 +00:00
panic_abort
core
2020-07-30 14:17:59 +00:00
profiler_builtins
2022-11-07 10:45:52 +00:00
unwind
2021-06-21 13:26:26 +00:00
std_detect
2022-11-07 10:45:52 +00:00
test";
// core is required for our builtin derives to work in the proc_macro lib currently
const PROC_MACRO_DEPS: &str = "
std
core";